EasyManua.ls Logo

QTech QSW-2800 series User Manual

QTech QSW-2800 series
415 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #413 background imageLoading...
Page #413 background image
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
399
Chapter 61 Debugging and Diagnosis for
Packets Received and Sent by CPU
61.1 Introduction to Debugging
and Diagnosis for Packets
Received and Sent by CPU
The following commands are used to debug and diagnose the packets received and sent by
CPU, and are supposed to be used with the help of the technical support.
61.2 Debugging and Diagnosis for
Packets Received and Sent by CPU
Task List
Command
Explanation
Global Mode
cpu-rx-ratelimit protocol <protocol-type>
<packets>
no cpu-rx-ratelimit protocol [ <protocol- type> ]
Set the max rate of the CPU
receiving packets of the protocol
type, the no command set the max
rate to default.
clear cpu-rx-stat protocol [ <protocol-type> ]
Clear the statistics of the CPU
received packets of the protocol type.
Admin Mode
show cpu-rx protocol [ <protocol-type> ]
Show the information of the CPU
received packets of the protocol type.
debug driver {receive|send} [interface {<interface-
name> |all}] [protocol {<protocol-type> |discard
|all}][detail]
Turn on the showing of the CPU
receiving or sending packet
informations.
no debug driver {receive |send}
Turn off the showing of the CPU
receiving or sending packet
informations.

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the QTech QSW-2800 series and is the answer not in the manual?

QTech QSW-2800 series Specifications

General IconGeneral
ModelQSW-2800 series
CategorySwitch
TypeManaged
L3 FeaturesStatic Routing, RIP, OSPF, VRRP
Switching Capacity128Gbps
MAC Address Table16K
Jumbo Frame9K
L2 FeaturesVLAN, Port Mirroring
ManagementWeb, CLI, SNMP
Ports24 x 10/100/1000Base-T, 4 x 10G SFP+
Power SupplyAC 100-240V
Power Consumption30W
Humidity10% to 90% non-condensing
Dimensions440mm x 220mm x 44mm

Summary

Chapter 1 SWITCH MANAGEMENT

1.1 MANAGEMENT OPTIONS

Discusses the switch management options: in-band and out-of-band.

1.2 CLI INTERFACE

Introduces the Command Line Interface, its modes, syntax, and help functions.

Chapter 2 BASIC SWITCH CONFIGURATION

2.1 BASIC CONFIGURATION

Covers commands for entering/exiting admin mode, interface mode, and basic switch settings.

2.3 CONFIGURE SWITCH IP ADDRESSES

Explains IP address configuration methods: Manual, BOOTP, and DHCP.

Chapter 3 CLUSTER CONFIGURATION

3.1 Introduction to cluster network management

Introduces cluster network management concepts and features.

Chapter 4 PORT CONFIGURATION

4.1 Introduction to Port

Introduces port types and their configuration capabilities like speed and duplex.

4.2 Network Port Configuration Task List

Lists the tasks involved in configuring network ports, including combo mode and naming.

Chapter 5 PORT ISOLATION FUNCTION CONFIGURATION

5.1 Introduction to Port Isolation Function

Explains port isolation as an independent function to isolate port traffic within a VLAN.

5.2 Task Sequence of Port Isolation

Outlines the steps for configuring port isolation, including creating groups and adding ports.

Chapter 12 PORT SECURITY

12.1 Introduction to PORT SECURITY

Introduces port security as a MAC address-based mechanism for network access control.

12.2 PORT SECURITY Configuration Task List

Details the basic configuration steps for port security, including MAC addresses and violation modes.

Chapter 16 VLAN CONFIGURATION

16.1 VLAN CONFIGURATION

Introduces VLAN concepts, IEEE 802.1Q, and configuration task lists.

Chapter 17 MAC TABLE CONFIGURATION

17.1 Introduction to MAC Table

Explains the MAC table, static vs. dynamic addresses, and operations.

Chapter 19 QoS CONFIGURATION

19.1 Introduction to QoS

Introduces Quality of Service concepts, terms, and implementation.

Chapter 37 ACL CONFIGURATION

37.1 Introduction to ACL

Explains Access Control Lists for network traffic filtering and security.

Chapter 38 802.1X CONFIGURATION

38.1 Introduction to 802.1x

Introduces 802.1x for port-based network access control and authentication.

Chapter 41 SECURITY FEATURE CONFIGURATION

41.1 Introduction to Security Feature

Introduces security features like DoS protection, IP spoofing, and TCP attacks.

Chapter 42 TACACS+ CONFIGURATION

42.1 Introduction to TACACS+

Introduces TACACS+ as a terminal access controller for network access control.

Chapter 44 SSL CONFIGURATION

44.1 Introduction to SSL

Explains the Secure Socket Layer protocol for secure communication and its basic elements.

Chapter 59 MONITOR AND DEBUG

59.1 Ping

Explains the Ping command for checking network accessibility and basic connectivity.

59.3 Traceroute

Describes the Traceroute command for testing network paths and diagnosing failures.

59.5 Show

Introduces the 'show' command for displaying system, port, and protocol operational information.

59.6 Debug

Explains the use of debug commands for troubleshooting and diagnosing protocol issues.

Related product manuals